Category: Security

Guarding the Gates: The rise of network protection in the 1990s
As part of our 5-part series on the evolution of cybersecurity, check out our second article below that covers how the security industry laid the groundwork for a more holistic approach to cybersecurity. We are continuing our series that explores...

Cybersecurity Threat Advisory: HTTP/2 vulnerability
Amazon Web Services (AWS), Cloudflare, and Google announced measures to mitigate unprecedented distributed denial-of-service (DDoS) attacks that utilize an innovative HTTP/2 Rapid Reset technique. In this Cybersecurity Threat Advisory, learn the details of this threat, what the risks are, and...

The acute phenomenon of the cybersecurity skills shortage
Despite ongoing efforts to train recruits, it doesn’t appear that the cybersecurity skills shortage is going to abate any time soon. A survey of 301 IT and cybersecurity professionals conducted by Enterprise Strategy Group, an arm of TechTarget, on behalf...

Cybersecurity Threat Advisory: Cisco IOS XE zero-day vulnerability
This latest Cybersecurity Threat Advisory involves a critical authentication bypass zero-day vulnerability (CVE-2023-20198) discovered in Cisco IOS XE software, allowing unauthenticated attackers to gain full administrator privileges over affected routers and switches. This vulnerability is of utmost concern as it...

Threat Spotlight: How bad bot traffic is changing
Once used primarily by search engines, bots now have a variety of uses — both good and bad. The good bots are primarily search engine crawlers and other similar bots used for aggregating or monitoring content. These bots obey the...

Cybersecurity Threat Advisory: Significant increase of cyber incidents
This Cybersecurity Threat Advisory sheds light on the recent global events between Israel and Hamas that have caused a surge in cyber incidents from hacker activists, also known as “hacktivists”. These attacks have been experienced on both sides of the...

Top 10 cybersecurity misconfigurations identified by CISA and NSA
The CISA and NSA jointly released a list of the top 10 cybersecurity misconfigurations recently. These misconfigurations often lead to breaches and incidents that should be remedied. The report’s executive summary concludes: “These most common misconfigurations illustrate a trend of...

Demand for managed cloud services continues to grow
The managed cloud services market is forecasted to reach $60.7 billion in revenue by 2027 after growing at a 12 percent compound annual rate. The bulk of those managed services are naturally going to be provided by the cloud service...

30 tips for Cybersecurity Awareness Month
In collaboration with the National Cybersecurity Alliance, the National Cybersecurity Division of the Department of Homeland Security has been recognizing National Cybersecurity Awareness Month every October since 2004. The goal is to educate individuals and businesses on cyber risks and...

Quishing: What you need to know about QR code email attacks
In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...